Computer Security
[EN] securityvulns.ru no-pyccku


Sudo protection bypass
Published:20.06.2010
Source:
SecurityVulns ID:10942
Type:client
Threat Level:
5/10
Description:It's possible to bypass PATH variable sanitization be setting few PATH variables.
Affected:SUDO : sudo 1.6
CVE:CVE-2010-1646 (The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.)
Original documentdocumentMANDRIVA, [ MDVSA-2010:118 ] sudo (20.06.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod